LodgeOSINT

Navigating
the data layer.

LodgeOSINT is a hub dedicated to the art and ethics of digital discovery. In an era of information density, the ability to verify facts and protect personal privacy is no longer a niche skill โ€” it is a fundamental requirement for digital citizenship. This platform is designed for journalists, researchers, and the privacy-conscious who need to navigate public records, domain architecture, and digital breadcrumbs with precision.

๐Ÿ”’ Framing & Ethics All tools and techniques here are framed through the lens of defensive security awareness, privacy education, and legitimate research methodology. OSINT is a passive discipline โ€” it works entirely with publicly available information. This is not offensive security.
lodge_osint โ€” bash
lodge@osint:~$ whois williamlodge.com
Registrant: William Lodge
Location: Boulder, CO US
Created: 2019-04-12

lodge@osint:~$ dig williamlodge.com ANY
A โ†’ 104.21.x.x (Cloudflare)
MX โ†’ mail.williamlodge.com
TXT โ†’ v=spf1 include:...

lodge@osint:~$ python3 footprint.py
Navigate the Hub

Five sections. One methodology.

The Discipline

Intelligence from open sources.

๐Ÿ“ฐ

For Journalists

Verify digital evidence โ€” the location of a video, the true ownership of a website, the authenticity of an image. Frameworks for grounding reports in technical fact before publication.

๐Ÿ›ก๏ธ

For the Privacy-Conscious

Audit your own digital footprint. See what data brokers, search engines, and people-search sites know about you โ€” then take steps to reduce your exposure before someone else finds it.

๐Ÿ”ฌ

For Researchers

Domain architecture, IP history, social media pivots, and public records analysis. Systematic methodology for turning scattered public data into structured intelligence.

Tool Stack

The research toolkit.

A sampling of the full stack. See the Tools hub for the complete reference with usage notes.

Identity & People Research

IntelTechniques Identity

The gold standard for personal privacy and OSINT workflows. Comprehensive browser-based tools for pivoting from usernames or emails into public data.

Have I Been Pwned Breach

Check if your email has appeared in data breaches. Essential first step for anyone auditing their own digital footprint or investigating credential exposure.

Epieos Identity

Search Google and Skype accounts linked to an email address without alerting the target. Useful for verifying identity claims in research contexts.

Domain & Network Infrastructure

ViewDNS.info Domain

Multi-tool site for reverse WHOIS, DNS records, IP history, and hosting history research. The Swiss Army knife of domain intelligence.

Censys Network

Deep searching of internet-connected devices and server certificates. Find infrastructure relationships and identify what's exposed.

DNSDumpster Domain

Excellent for domain footprinting and discovering subdomains. Visualize a target's DNS landscape and find infrastructure that may not be obvious from the surface.

Research Guides

Articles in progress.

Full guide index at /osint/guides/.

01 //

OSINT for Journalists โ€” A Beginner's Guide

The foundational methodology for using open-source intelligence in investigative reporting. Covers verification workflow, tool setup, and ethical guardrails for newsroom environments.

What is OSINT Verification workflow Source protection Tool setup Ethics
โ†’ Read in Guides
02 //

How to Audit Your Own Digital Footprint

A step-by-step self-OSINT audit covering search engines, social media, data brokers, and people-search sites. Before you can protect your privacy, you have to see what the world sees.

Search engine scrubbing Social data dumps Data broker opt-outs Google Alerts
โ†’ Read in Guides
03 //

Domain Intelligence: What a WHOIS Record Tells You

A WHOIS record is a window into a domain's history, ownership, and infrastructure relationships. Learn to read them properly โ€” most people miss 80% of the available signal.

WHOIS anatomy Privacy proxies Historical records IP relationships
โ†’ Read in Guides
04 //

Verifying Images and Videos in the Field

Practical techniques for confirming the authenticity and origin of visual media โ€” from reverse image search to metadata extraction to geolocation from visual clues.

Reverse image search Metadata extraction ELA analysis Geolocation
โ†’ Read in Guides
FAQ

Common questions.

What exactly is OSINT?
Open-Source Intelligence is the collection and analysis of data gathered from public sources โ€” domain records, social media, government archives โ€” to produce actionable insights. If it's publicly accessible, it's in scope.
Is OSINT the same as hacking?
No. While hackers often use OSINT for reconnaissance, OSINT itself is a passive research methodology that relies entirely on publicly available information and legal access points. No systems are touched.
How does this help journalists and researchers?
It provides a framework for verifying digital evidence โ€” the location of a video, the true ownership of a website, the history of a domain โ€” ensuring reports are grounded in technical fact before publication.
Can anyone audit their own digital footprint?
Yes, and you should. Auditing your own footprint shows you what data brokers and search engines have indexed about you โ€” so you can take steps to reduce exposure before someone else finds it first.
Is OSINT legal?
Gathering publicly accessible information is legal. The ethics of OSINT demand that this power is used for defensive awareness, education, and legitimate research โ€” not surveillance, harassment, or harm.
What tools do I need to start?
You don't need expensive software. Most investigations start with advanced search engine operators, browser extensions like InVID, and a structured methodology. The framework matters more than the tools. See the Tools hub.

Need research support?

OSINT methodology for journalists, organizations, and individuals who need verifiable digital intelligence done carefully and ethically.